Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Centralized management system and centralized management method for user root permission

A technology for user rights and authorization management, applied in the computer field, can solve the problems of redundant information growth and waste of resources, and achieve the effects of low cost, resource saving, and rapid centralized management

Active Publication Date: 2013-04-24
新浪技术(中国)有限公司
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, the inventors of the present invention have found that the system of the prior art also sends the above-mentioned configuration file to other servers; Execution permissions are redundant information; with the sharp increase in the number of servers that need centralized management and the increase in the number of users, the redundant information recorded in the configuration file will increase dramatically, resulting in waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized management system and centralized management method for user root permission
  • Centralized management system and centralized management method for user root permission
  • Centralized management system and centralized management method for user root permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and preferred embodiments. However, it should be noted that many of the details listed in the specification are only for readers to have a thorough understanding of one or more aspects of the present invention, and these aspects of the present invention can be implemented even without these specific details.

[0028] As used herein, terms such as "module" and "system" are intended to include computer-related entities such as, but not limited to, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a module may be, but is not limited to being limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. For example, both an applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a centralized management system and a centralized management method for user root permission. The centralized management system for the user root permission comprises an authorization management server, a data center and a server cluster, wherein after the authorization management server receives user permission modification information, the authorization management server updates record in a permission information data base of the data center; after a user logs in and inputs a root permission command, servers in the server cluster generate a query condition according to a login user name of the user, the name of the root permission command and a server identification and uses the query condition to query the data center; according to the query results, the root permission command is determined to be executed or not. The user permission information is stored in the data center, centralized management is carried out on the user root permission of each server in the server cluster through the data center, all user permission information is not needed to be stored in configuration files of each sever, and therefore the resources in the system are largely saved.

Description

technical field [0001] The invention relates to computer technology, in particular to a centralized management system and management method for user root authority in a computer operating system. Background technique [0002] Root (root) authority is a kind of system authority, which can be understood as a concept with System (system) authority, but higher than Administrator (administrator) authority; root account is a super administrator user account in Linux and Unix systems, This account has the highest authority of the entire system, can start or stop a process, delete or add users, add or disable hardware, and so on. [0003] For example, a user with root authority in a Linux system can enter root authority commands on the command line to perform certain functions. For ordinary users who are not root users, the operating system can also allow them to use certain root authority commands: the user name of ordinary users is recorded in the configuration file / etc / sudoers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/30
Inventor 聂彦超陈尔冬
Owner 新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products